The search functionality is under construction.

Author Search Result

[Author] Hideki TODE(71hit)

61-71hit(71hit)

  • Transmission Timing Control among Both Aperiodic and Periodic Flows for Reliable Transfer by Restricted Packet Loss and within Permissible Delay in Wireless Sensor Networks

    Aya KOYAMA  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER-Network

      Pubricized:
    2023/03/14
      Vol:
    E106-B No:9
      Page(s):
    817-826

    Nowadays, in various wireless sensor networks, both aperiodically generated packets like event detections and periodically generated ones for environmental, machinery, vital monitoring, etc. are transferred. Thus, packet loss caused by collision should be suppressed among aperiodic and periodic packets. In addition, some packets for wireless applications such as factory IoT must be transferred within permissible end-to-end delays, in addition to improving packet loss. In this paper, we propose transmission timing control of both aperiodic and periodic packets at an upper layer of medium access control (MAC). First, to suppress packet loss caused by collision, transmission timings of aperiodic and periodic packets are distributed on the time axis. Then, transmission timings of delay-bounded packets with permissible delays are assigned within the bounded periods so that transfer within their permissible delays is possible to maximally satisfy their permissible delays. Such control at an upper layer has advantages of no modification to the MAC layer standardized by IEEE 802.11, 802.15.4, etc. and low sensor node cost, whereas existing approaches at the MAC layer rely on MAC modifications and time synchronization among all sensor nodes. Performance evaluation verifies that the proposed transmission timing control improves packet loss rate regardless of the presence or absence of packet's periodicity and permissible delay, and restricts average transfer delay of delay-bounded packets within their permissible delays comparably to a greedy approach that transmits delay-bounded packets to the MAC layer immediately when they are generated at an upper layer.

  • Crosstalk-Aware Resource Allocation Based on Optical Path Adjacency and Crosstalk Budget for Space Division Multiplexing Elastic Optical Networks

    Kosuke KUBOTA  Yosuke TANIGAWA  Yusuke HIROTA  Hideki TODE  

     
    PAPER

      Pubricized:
    2023/09/12
      Vol:
    E107-B No:1
      Page(s):
    27-38

    To cope with the drastic increase in traffic, space division multiplexing elastic optical networks (SDM-EONs) have been investigated. In multicore fiber environments that realize SDM-EONs, crosstalk (XT) occurs between optical paths transmitted in the same frequency slots of adjacent cores, and the quality of the optical paths is degraded by the mutual influence of XT. To solve this problem, we propose a core and spectrum assignment method that introduces the concept of prohibited frequency slots to protect the degraded optical paths. First-fit-based spectrum resource allocation algorithms, including our previous study, have the problem that only some frequency slots are used at low loads, and XT occurs even though sufficient frequency slots are available. In this study, we propose a core and spectrum assignment method that introduces the concepts of “adjacency criterion” and “XT budget” to suppress XT at low and middle loads without worsening the path blocking rate at high loads. We demonstrate the effectiveness of the proposed method in terms of the path blocking rate using computer simulations.

  • Medium Access Control Protocol for Voice Traffic in IEEE 802.11 WLANs

    Jong-Ok KIM  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Network

      Vol:
    E89-B No:5
      Page(s):
    1545-1553

    Recently, voice over WLAN has become an attractive service, and it is expected to be the most popular application in the near future due to its low cost and easy deployment. It has been reported that there occurs unfairness between downlink and uplink in the 802.11 WLAN. This is mainly caused by CSMA/CA employed in DCF. All stations including an AP fairly compete for shared wireless medium. Thus, in particular, the unfairness has an adverse impact on bi-directional voice calls. Downlink voice connections become a primary factor to limit voice capacity. In this paper, we propose a novel medium access protocol, so called DCFmm, in order to improve QoS of downlink voice traffic as well as fairness between bi-directional voice connections. DCFmm is designed to enhance 802.11 DCF, and is fully compatible with the legacy DCF. In addition, it requires only protocol modifications of an AP. Thus, it can be easily implemented into existing 802.11 WLANs. DCFmm is compared with two conventional techniques through computer simulations. Extensive simulation results show that the proposed DCFmm can improve fairness between downlink and uplink, and consequently, support larger number of voice calls than DCF.

  • A Resilient Video Streaming System Based on Location-Aware Overlapped Cluster Trees

    Tomoki MOTOHASHI  Akihiro FUJIMOTO  Yusuke HIROTA  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Network

      Vol:
    E96-B No:11
      Page(s):
    2865-2874

    For real-time video streaming, tree-based Application Level Multicasts (ALMs) are effective with respect to transmission delay and jitter. In particular, multiple-tree ALMs can alleviate the inefficient use of upload bandwidth among the nodes. However, most conventional multiple-tree ALMs are constructed using a Distributed Hash Table (DHT). This causes considerable delay and consumes substantial network resources because the DHT, generally, does not take distances in the IP network into account. In addition, the network constructed by a DHT has poor churn resilience because the network needs to reconstruct all the substreams of the tree network. In this paper, we propose a construction method involving overlapped cluster trees for delivering streamed data that are churn resilient. In addition, these overlapped cluster trees can decrease both the delay and the consumption of network resources because the node-connecting process takes IP network distances into account. In the proposed method, clusters are divided or merged using their numbers of members to optimize cluster size. We evaluated the performance of the proposed method via extensive computer simulations. The results show that the proposed method is more effective than conventional multiple-tree ALMs.

  • Delay-Sensitive Retransmission Method Based on Network Coding in Wireless LANs

    Yosuke TANIGAWA  Jong-Ok KIM  Hideki TODE  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3345-3353

    Recently, network coding (NC) has been popularly applied to wireless networks in order to improve scarce wireless capacity. In wireless LANs, NC can be applied to packet retransmission, and a base station can simultaneously retransmit multiple packets destined to different wireless stations by a single retransmission trial. On the other hand, NC creates additional packet delay at both base station and wireless stations, and hence, packet transfer delay may increase seriously. However, existing NC-based retransmission methods do not consider this additional delay explicitly. In addition, when the number of flows is small, NC exhibits less benefit because the chances of NC-based retransmission are highly reduced. Therefore, in this paper, we propose a novel NC-based retransmission method in order to improve packet transfer delay and jitter of received packets. Moreover, to achieve further improvement of delay, jitter and retransmission efficiency even when there exist a small number of traffic flows, we propose a retransmission method in which NC-based retransmission cooperates with the typical ARQ method. We overcome the disadvantage of NC-based retransmission by combining with ARQ cooperatively. Finally, we show the effectiveness of the proposed methods by extensive computer simulation.

  • Power-Saving Method of Wireless Stations Based on Adaptive Control of Bidirectional Burst Transmission in Wireless LANs

    Kohei OMORI  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER-Network

      Pubricized:
    2016/12/20
      Vol:
    E100-B No:6
      Page(s):
    986-996

    This paper addresses power saving for STAs (Wireless Stations) in WLANs (Wireless LANs). Mobile devices are increasingly used in situations in which they access WLANs. However, mobile devices consume large amounts of power when they communicate through a WLAN, and this shortens their battery lifetime. IEEE 802.11 specifies PSM (Power-Saving Mode) as the power-saving method for standard WLANs. However, the sleep conditions specified by PSM for STAs are not optimal in terms of power saving, except when the number of STAs is small, and this increases packet transfer delay. In this paper, we propose a power-saving method in which STAs reduce power consumption by sleeping for a period specified by the NAV (Network Allocation Vector) duration, which is set by an RTS/CTS handshake, and the duration of the NAV is extended by bidirectional burst transmission. To suppress the transfer delay caused by the bidirectional burst transmission, an AP (Access Point) manages the transmission deadline of each downlink packet on the basis of its acceptable value of delay and adapts the number of packets transferred in the bidirectional burst transmission. Although another existing method also uses the NAV duration to manage STA sleeping, the bidirectional burst transmission can only be initiated by the STAs themselves and the NAV is of an extremely limited duration. On the other hand, the proposed method specifies generalized bidirectional burst transmission without the limitations of the transmission initiator and the burst length within acceptable packet transfer delay. Moreover, we investigate the combination of the proposed method with PSM in order to improve the performance in situations in which the number of STAs is small by taking advantage of the combined properties of PSM and the proposed method. The evaluation results demonstrate that these proposed methods can reduce the power consumption of wireless stations and suppress packet transfer delay.

  • A Study on Hop Count Reduction of Frame Transfer in ZigBee Network by Wireless LAN Cooperation

    Yosuke TANIGAWA  Seiya DEJIMA  Hideki TODE  

     
    PAPER

      Pubricized:
    2019/01/22
      Vol:
    E102-B No:7
      Page(s):
    1279-1291

    Recently, ZigBee has been attracting attention as a low-power and short-range wireless communication standard. In ZigBee networks, it is necessary to suppress frame transfer load because ZigBee needs to operate within severe capacity constraints and with low power consumption. However, in the typical environments in which ZigBee is used, such as smart home networks, WLAN (Wireless LAN) generally coexists, and radio interference occurs between the two networks. Existing studies focused on only interference avoidance. On the other hand, in this paper, we focus on adaptive cooperation between ZigBee network and WLAN. Specifically, from the viewpoints of WLANs that have wider communication range but have many idle periods in some environments like homes, we propose and study a hop count reduction method of ZigBee frame transfer by partially employing WLAN communication to transfer ZigBee frames. To the best of our knowledge, this is the first paper that considers the adaptive cooperation between ZigBee network and WLAN, where some ZigBee frames are transferred via WLAN to the sink. This is a completely new approach different from existing interference avoidance approaches. Then, we evaluate the hop count reduction by considering the number and the positions of relay points to transfer ZigBee frames to WLAN, and ZigBee tree topology for frame transfer routes. Through the evaluation, two realistic deployment policies of the relay points are derived. Finally, as specific advantages from the hop count reduction, we demonstrate the performance improvement about sink arrival ratio and end-to-end transfer delay of ZigBee frames, and energy consumption.

  • Fast Failure Restoration Algorithm with Reduced Messages Based on Flooding Mechanism

    Komwut WIPUSITWARAKUN  Hideki TODE  Hiromasa IKEDA  

     
    PAPER-Communication Networks and Services

      Vol:
    E80-B No:4
      Page(s):
    564-572

    A highly reliable network which can restore itself from network failures is one important concept for the future high capacity broadband network. In such self-healing network, flooding based failure-restoration algorithm is used to locate new routes and then to reroute failure traffic to that routes automatically when network failures such as link or node failures occur. Since the speed of this algorithm is degraded by the large amount of restoration messages produced by the process, such large volume messages should be reduced. In this paper, the scheme will be proposed, which reduces the large volume messages and efficiently selects alternative routes. In this scheme, the Message Wall will be used to filter useless restoration messages at the tandem nodes and Multi-Message Selecting method will be used to rapidly select a group of link-disjointed alternative routes from the feasible ones in each Flooding Wave sequence. The simulation results show that restoration messages are dramatically reduced and adequate alternative routes can be quickly found out.

  • VP's Priority Based Restoring Function Enhanced Self-healing Algorithm

    Komwut WIPUSITWARAKUN  Hideki TODE  Hiromasa IKEDA  

     
    PAPER-ATM Networks

      Vol:
    E81-B No:11
      Page(s):
    2100-2109

    Network survivability against various unexpected failures is one of indispensable technologies for the B-ISDN infrastructure. Self-healing algorithm is the technique to automatically restore the failed VP's (virtual paths) in the backbone ATM network. Since the B-ISDN transports various kinds of traffic with various levels of priority (Grade of Service: GoS), the effective self-healing algorithm should orderly restore the failed VP's based on the priority of their traversing traffic. This paper proposes the priority based restoring self-healing algorithm, which realizes the priority based restoring function by the two-timer mechanisms and a simple capacity reserving protocol. The simulation results show that the proposed algorithm can schedule the restoration process so that the failed VP's with higher priority are restored before the others with lower priority. In addition, the significant improvement in restoration speed for the highest priority traffic class has been achieved.

  • Buffer Control Scheme Considering Service Class of Flows

    Katsuya MINAMI  Hideki TODE  Koso MURAKAMI  

     
    PAPER

      Vol:
    E85-B No:1
      Page(s):
    98-106

    Recently, as multimedia and high-speed traffic become more popular on the Internet, the various traffic requiring different qualities of service (QoS) will co-exist. In addition, classified service based on Diff-Serv (Differentiated Service), MPLS (Multi-Protocol Label Switching),etc., have come into wide use. Today's Internet environment requires routers to perform control mechanisms in order to guarantee various QoSs. In this paper, we propose a buffer management scheme for the Internet router that uses class-based priority control. This paper focuses on per-flow queueing, and evaluates the performance of the proposed buffer management scheme. Realization of differentiated services and dissolution of buffer occupation by specific flow is expected by the proposed control.

  • Copy-Token Allocation Control for Adaptive Multicast Routing and Its Performance

    Hideki TODE  Hiroki YAMAUCHI  Hiromasa IKEDA  

     
    PAPER-Network

      Vol:
    E83-B No:4
      Page(s):
    803-811

    An efficient scheme for establishing the multicast-path on ATM network is to configure the tree-shaped path via several intermediate copy nodes. This scheme needs the multicast routing control. Thus, restricting the number of copy nodes was proposed since it make this control fast and simple. However, if restricted number of copy nodes is fixed in the network design, multicast traffic will concentrate around copy nodes, and as a result, the possibility of occurring congestion will be higher. In our research, we permit restricted number of nodes as intermediate nodes which branch the tree-shaped path at routing, and name this permission "copy-token. " Namely, the node which has "copy-token" is defined as the copy node. Our research purpose is to distribute the multicast traffic by adaptively allocating "copy-token" to nodes which satisfy the conditions of both the priority for multicasting such as lower offered load and the geographical distribution at the same time. Finally, we evaluate the performance of our proposed routing scheme on the blocking probability through computer simulations.

61-71hit(71hit)